eBooks-it.org Logo
eBooks-IT.org Inner Image

Agile IT Security Implementation Methodology

Agile IT Security Implementation Methodology Image

Book Details:

Publisher:Packt Publishing
Series: Packt , Implementation
Author:Jeff Laskowski
Edition:1
ISBN-10:1849685703
ISBN-13:9781849685702
Pages:120
Published:Nov 22 2011
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:2.01 MB

Book Description:

Security is one of the most difficult areas in today's IT industry. The reason being; the speed at which security methods are developing is considerably slower than the methods of hacking. One of the ways to tackle this is to implement Agile IT Security. Agile IT security methodology is based on proven software development practices. It takes the best works from Agile Software Development (Scrum, OpenUp, Lean) and applies it to security implementations. This book combines the Agile software development practices with IT security. It teaches you how to deal with the ever-increasing threat to IT security and helps you build robust security with lesser costs than most other methods of security. It is designed to teach the fundamental methodologies of an agile approach to IT security. Its intent is to compare traditional IT security implementation approaches to new agile methodologies. Written by a senior IT specialist at IBM, you can rest assured of the usability of these methods directly in your organization. This book will teach IT Security professionals the concepts and principles that IT development has been using for years to help minimize risk and work more efficiently. The book will take you through various scenarios and aspects of security issues and teach you how to implement security and overcome hurdles during your implementation. It begins by identifying risks in IT security and showing how Agile principles can be used to tackle them. It then moves to developing security policies and identifying your organization's assets. The last section teaches you how you can overcome real-world issues in implementing Agile security in your organization including dealing with your colleagues. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts. The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. Understand the various modern-day security risks and concerns and how Agile IT security is useful in dealing with these risks. Learn Agile principles like pairwise, refactoring, collective ownership, collaboration, track project divergence and velocity rates. Develop security policies and articulate security value and take steps to ensure your employees' security awareness. Identify your organization's high value assets and apply risk-driven security. Employ Lean implementation principles like eliminating waste, amplified learning, late decisions and fast deliveries. Learn what teams in your organization can help you with security, and tie up with them. Learn how to overcome Agile barriers and fears and train your security professionals. Learn Agile team success factors and Agile risk success factors.

Download Link:

Related Books:

IT Security Metrics

A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics Image
Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts to achieve continuous security improvement over time. Real-world examples of security measurement projects are included in this definitive guide. Define security metrics ...

Syngress IT Security Project Management

Handbook
Syngress IT Security Project Management Image
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expe...

IT Security Management

Best Damn Book Period
IT Security Management Image
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing daily workload.Coverage includes Business Continuity, Disaster Recovery, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration.Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedaker, this volume is an indispensable addition to a serious securi...



2007 - 2021 © eBooks-IT.org